Articles

Sort by
Previous Page Page 2 of 3 Next Page
  1. Research

    Automated deception detection of 911 call transcripts

    This study is a successful proof of concept of using automated text analysis to accurately classify transcribed 911 homicide calls according to their veracity. Fifty matched, caller-side transcripts were label...

    Mary B Burns and Kevin C Moffitt

    Security Informatics 2014 3:8

    Published on: 12 August 2014

  2. Research

    Modelling the spatial and social dynamics of insurgency

    Insurgency emerges from many interactions between numerous social, economical, and geographical factors. Adequately accounting for the large number of potentially relevant interactions, and the complex ways in...

    Philippe J Giabbanelli

    Security Informatics 2014 3:2

    Published on: 2 May 2014

  3. Research

    Harvesting and analysis of weak signals for detecting lone wolf terrorists

    Lone wolf terrorists pose a large threat to modern society. The current ability to identify and stop these kinds of terrorists before they commit a terror act is limited since they are hard to detect using tra...

    Joel Brynielsson, Andreas Horndahl, Fredrik Johansson, Lisa Kaati, Christian Mårtenson and Pontus Svenson

    Security Informatics 2013 2:11

    Published on: 10 July 2013

  4. Research

    Algorithmic criminology

    Computational criminology has been seen primarily as computer-intensive simulations of criminal wrongdoing. But there is a growing menu of computer-intensive applications in criminology that one might call “co...

    Richard Berk

    Security Informatics 2013 2:5

    Published on: 23 January 2013

  5. Research

    Predicting sentencing outcomes with centrality measures

    Despite their importance for stakeholders in the criminal justice system, few methods have been developed for determining which criminal behavior variables will produce accurate sentence predictions. Some appr...

    Carlo Morselli, Victor Hugo Masias, Fernando Crespo and Sigifredo Laengle

    Security Informatics 2013 2:4

    Published on: 22 January 2013

  6. Research

    Validating distance decay through agent based modeling

    The objectives of this research are to display the utility of using agent based model and simulated experiments in understanding criminal behavior. In particular, this research focuses upon the distance decay ...

    Arvind Verma, Ramyaa Ramyaa and Suresh Marru

    Security Informatics 2013 2:3

    Published on: 19 January 2013

  7. Research

    Through a computational lens: using dual computer-criminology degree programs to advance the study of criminology and criminal justice practice

    Computational criminology seeks to address criminological and criminal justice problems through the use of applied mathematics, computer science, and criminology. The development of mathematical and computatio...

    Colby L Valentine, Carter Hay, Kevin M Beaver and Thomas G Blomberg

    Security Informatics 2013 2:2

    Published on: 16 January 2013

  8. Research

    Early warning analysis for social diffusion events

    There is considerable interest in developing predictive capabilities for social diffusion processes, for instance to permit early identification of emerging contentious situations, rapid detection of disease o...

    Richard Colbaugh and Kristin Glass

    Security Informatics 2012 1:18

    Published on: 15 November 2012

  9. Research

    Diversity and resistance in a model network with adaptive software

    Attacks on computers are increasingly sophisticated, automated and damaging. We take inspiration from the diversity and adaptation of the immune system to design a new kind of computer security system utilizin...

    Neal Holtschulte and Melanie Moses

    Security Informatics 2012 1:19

    Published on: 6 November 2012

  10. Research

    A multi-modal network architecture for knowledge discovery

    The collection and assessment of national security related information often involves an arduous process of detecting relevant associations between people, events, and locations—typically within very large dat...

    Craig M Vineyard, Stephen J Verzi, Michael L Bernard, Shawn E Taylor, Irene Dubicka and Thomas P Caudell

    Security Informatics 2012 1:20

    Published on: 6 November 2012

Previous Page Page 2 of 3 Next Page